|
|
|
Angeliki Mentzafou, Yiannis Panagopoulos and Elias Dimitriou
Water quality indices that describe the status of water are commonly used in freshwater vulnerability assessment. The design of river water quality monitoring programs has always been a complex process and despite the numerous methodologies employed by e...
ver más
|
|
|
|
|
|
|
Filippo Dolente, Rosario Giuseppe Garroppo and Michele Pagano
The paper presents an experimental security assessment within two widely used open-source 5G projects, namely Open5GS and OAI (Open-Air Interface). The examination concentrates on two network functions (NFs) that are externally exposed within the core ne...
ver más
|
|
|
|
|
|
|
Gerald Albert Baeribameng Yiran, Martin Oteng Ababio, Albert Nii Moe Allotey, Richard Yao Kofie and Lasse Møller-Jensen
Climate change seriously threatens human systems, properties and livelihoods. Global projections suggest a continuous increase in the frequency and severity of weather events, with severe outcomes. Although the trends and impacts are highly variable depe...
ver más
|
|
|
|
|
|
|
Israel Edem Agbehadji, Stefanie Schütte, Muthoni Masinde, Joel Botai and Tafadzwanashe Mabhaudhi
Early warning systems (EWS) facilitate societies? preparedness and effective response capabilities to climate risks. Climate risks embody hazards, exposure, and vulnerability associated with a particular geographical area. Building an effective EWS requi...
ver más
|
|
|
|
|
|
|
Konstantinos Ntafloukas, Liliana Pasquale, Beatriz Martinez-Pastor and Daniel P. McCrum
Transportation networks are fundamental to the efficient and safe functioning of modern societies. In the past, physical and cyber space were treated as isolated environments, resulting in transportation network being considered vulnerable only to threat...
ver más
|
|
|
|
|
|
|
Guido Paliaga, Andrea Ferrando, Pierluigi Brandolini, Paola Coratza and Francesco Faccini
Increasing interest in the natural environment and greater hiking activity have resulted in higher anthropogenic pressure in areas characterized by a geographic/physical setting that could present hazardous conditions. The development of these activities...
ver más
|
|
|
|
|
|
|
Hiroyuki Miura, Masashi Matsuoka, Juan C. Reyes, Nelson Pulido, Mitsufumi Hashimoto, Andrea C. Riaño, Alvaro Hurtado, Raul Rincon, Helber García and Carlos Lozano
Early disaster responses in damaged areas after a large earthquake are indispensable for stakeholders to assess and grasp the impacts such as building and infrastructure damage and disrupted community functionality as soon as possible. This study introdu...
ver más
|
|
|
|
|
|
|
Xiaobo Tan, Yingjie Xu, Tong Wu and Bohan Li
Cross-site scripting vulnerability (XSS) is one of the most frequently exploited and harmful vulnerabilities among web vulnerabilities. In recent years, many researchers have used different machine learning methods to detect network attacks, but these me...
ver más
|
|
|
|
|
|
|
Kongpei Wu, Huiqin Qu and Conggui Huang
For the current stage of complex and changing network environments and correlated and synchronized vulnerability attacks, this study first fuses attack graph technology and Bayesian networks and constructs Bayesian attack graphs toportray the correlation...
ver más
|
|
|
|
|
|
|
Aditia Rojali, Hector R. Fuentes, Carlos M. Chang and Hesham Ali
This study investigates the potential damage to flexible pavements caused by rising groundwater tables resulting from sea-level rise. A case study was conducted in Miami-Dade County, Southeast Florida, a low-lying area at high risk of inundation and risi...
ver más
|
|
|
|